# Cloud NAT Module
Simple Cloud NAT management, with optional router creation.
- [Basic Example](#basic-example)
- [Subnetwork configuration](#subnetwork-configuration)
- [Reserved IPs and custom rules](#reserved-ips-and-custom-rules)
- [Hybrid NAT](#hybrid-nat)
- [Variables](#variables)
- [Outputs](#outputs)
## Basic Example
```hcl
module "nat" {
source = "./fabric/modules/net-cloudnat"
project_id = var.project_id
region = var.region
name = "default"
router_network = var.vpc.self_link
}
# tftest modules=1 resources=2 e2e
```
## Subnetwork configuration
Subnetwork configuration is defined via the `config_source_subnetworks` variable:
- the default is to configure all ranges for all subnets
- to only configure primary ranges set `config_source_subnetworks.primary_ranges_only` to `true`
- to specify a list of subnets set `config_source_subnetworks.all` to `false` and provide a list of subnets in `config_source_subnetworks.subnetworks`
When specifying subnets the default for IP ranges is to consider all ranges (primary and secondaries). More control can be obtained via the `all` subnetwork attribute: when set to `false` only the primary subnet range is considered, unless secondary ranges are specified via the `secondary_ranges` attribute.
```hcl
module "nat" {
source = "./fabric/modules/net-cloudnat"
project_id = var.project_id
region = var.region
name = "default"
router_network = var.vpc.self_link
config_source_subnetworks = {
all = false
subnetworks = [
{
# all ip ranges
self_link = "projects/${var.project_id}/regions/${var.region}/subnetworks/net-0"
},
{
# primary range only
self_link = "projects/${var.project_id}/regions/${var.region}/subnetworks/net-1"
all_ranges = false
},
{
# both primary and specified secondary ranges
self_link = "projects/${var.project_id}/regions/${var.region}/subnetworks/net-2"
all_ranges = false
secondary_ranges = ["pods"]
}
]
}
}
# tftest modules=1 resources=2
```
## Reserved IPs and custom rules
```hcl
module "addresses" {
source = "./fabric/modules/net-address"
project_id = var.project_id
external_addresses = {
a1 = { region = var.region }
a2 = { region = var.region }
a3 = { region = var.region }
}
}
module "nat" {
source = "./fabric/modules/net-cloudnat"
project_id = var.project_id
region = var.region
name = "nat"
router_network = var.vpc.self_link
addresses = [
module.addresses.external_addresses["a1"].self_link,
module.addresses.external_addresses["a3"].self_link
]
config_port_allocation = {
enable_endpoint_independent_mapping = false
}
rules = [
{
description = "rule1"
match = "destination.ip == '8.8.8.8'"
source_ips = [
module.addresses.external_addresses["a2"].self_link
]
}
]
}
# tftest modules=2 resources=5 inventory=rules.yaml e2e
```
## Hybrid NAT
```hcl
module "vpc1" {
source = "./fabric/modules/net-vpc"
project_id = var.project_id
name = "vpc1"
subnets = [
{
ip_cidr_range = "10.0.0.0/24"
name = "vpc1-subnet"
region = var.region
}
]
subnets_private_nat = [
{
ip_cidr_range = "192.168.15.0/24"
name = "vpc1-nat"
region = var.region
}
]
}
module "vpc1-nat" {
source = "./fabric/modules/net-cloudnat"
project_id = var.project_id
region = var.region
name = "vpc1-nat"
type = "PRIVATE"
router_network = module.vpc1.id
config_source_subnetworks = {
all = false
subnetworks = [
{
self_link = module.vpc1.subnet_ids["${var.region}/vpc1-subnet"]
}
]
}
config_port_allocation = {
enable_endpoint_independent_mapping = false
enable_dynamic_port_allocation = true
}
rules = [
{
description = "private nat"
match = "nexthop.is_hybrid"
source_ranges = [
module.vpc1.subnets_private_nat["${var.region}/vpc1-nat"].id
]
}
]
}
# tftest modules=2 resources=7 inventory=hybrid.yaml
```
## Variables
| name | description | type | required | default |
|---|---|:---:|:---:|:---:|
| [name](variables.tf#L77) | Name of the Cloud NAT resource. | string
| ✓ | |
| [project_id](variables.tf#L82) | Project where resources will be created. | string
| ✓ | |
| [region](variables.tf#L87) | Region where resources will be created. | string
| ✓ | |
| [addresses](variables.tf#L17) | Optional list of external address self links. | list(string)
| | []
|
| [config_port_allocation](variables.tf#L23) | Configuration for how to assign ports to virtual machines. min_ports_per_vm and max_ports_per_vm have no effect unless enable_dynamic_port_allocation is set to 'true'. | object({…})
| | {}
|
| [config_source_subnetworks](variables.tf#L39) | Subnetwork configuration. | object({…})
| | {}
|
| [config_timeouts](variables.tf#L58) | Timeout configurations. | object({…})
| | {}
|
| [logging_filter](variables.tf#L71) | Enables logging if not null, value is one of 'ERRORS_ONLY', 'TRANSLATIONS_ONLY', 'ALL'. | string
| | null
|
| [router_asn](variables.tf#L92) | Router ASN used for auto-created router. | number
| | null
|
| [router_create](variables.tf#L98) | Create router. | bool
| | true
|
| [router_name](variables.tf#L104) | Router name, leave blank if router will be created to use auto generated name. | string
| | null
|
| [router_network](variables.tf#L110) | Name of the VPC used for auto-created router. | string
| | null
|
| [rules](variables.tf#L116) | List of rules associated with this NAT. | list(object({…}))
| | []
|
| [type](variables.tf#L136) | Whether this Cloud NAT is used for public or private IP translation. One of 'PUBLIC' or 'PRIVATE'. | string
| | "PUBLIC"
|
## Outputs
| name | description | sensitive |
|---|---|:---:|
| [id](outputs.tf#L17) | Fully qualified NAT (router) id. | |
| [name](outputs.tf#L22) | Name of the Cloud NAT. | |
| [nat_ip_allocate_option](outputs.tf#L27) | NAT IP allocation mode. | |
| [region](outputs.tf#L32) | Cloud NAT region. | |
| [router](outputs.tf#L37) | Cloud NAT router resources (if auto created). | |
| [router_name](outputs.tf#L46) | Cloud NAT router name. | |